vulnerability

Juniper Junos OS: 2024-07 Security Bulletin: Junos OS and Junos OS Evolved: Inconsistent information in the TE database can lead to an rpd crash (JSA83001) (CVE-2024-39541)

Severity
6
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:C)
Published
Jul 10, 2024
Added
Jul 11, 2024
Modified
Aug 11, 2025

Description

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).

When conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart.

This issue affects:

Junos OS:

* 22.4 versions before 22.4R3-S1,
* 23.2 versions before 23.2R2, 
* 23.4 versions before 23.4R1-S1, 23.4R2, 

This issue does not affect Junos OS versions earlier than 22.4R1.

Junos OS Evolved:

* 22.4-EVO versions before 22.4R3-S2-EVO,
* 23.2-EVO versions before 23.2R2-EVO,
* 23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO,

This issue does not affect Junos OS Evolved versions earlier than

before 22.4R1.

Solution

juniper-junos-os-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.